Search8 Results
- Knowledge Base
- Security and Access
- Secure Computing
To ensure that sensitive information stored on mobile devices is kept safe and secure, Drexel has established security standards for devices that synchronize information with university services.
- Knowledge Base
- Security and Access
- Security Consulting and Education
Describes the levels of secure data.
- Knowledge Base
- Security and Access
- Secure Computing
Drexel began a data security initiative as part of a comprehensive security, privacy, and compliance program to better protect academic, medical, financial, and other sensitive personal records entrusted to the University.
- Knowledge Base
- Security and Access
- Secure Computing
This article provides information on password managers and provides some recommended password managers.
- Knowledge Base
- Security and Access
- Secure Computing
Drexel has implemented DMARC, an email authentication, policy, and reporting protocol, to augment our email security initiative and efforts to combat phishing, email scams and spoofing of our domains.
- Knowledge Base
- Security and Access
- Secure Computing
To improve its cyber defenses, Drexel University recently embarked in a multi-year project to install advanced firewalls and other state-of-the-art protection technologies made by Palo Alto. Drexel University IT operated the border firewall on select campus networks throughout 2018. If you think that you are experiencing a problem caused by the border firewall, please contact your local IT support team or the Drexel University IT Help Desk at
https://drexel.edu/it/services/catalog/helpdesk/.
- Knowledge Base
- Security and Access
- Security Consulting and Education
This article highlights common security risks associated with desktop software, such as outdated software, malware, misconfiguration, and data breaches, and provides best practices to reduce those risks. Guidance includes using trusted sources, keeping software updated, enforcing strong authentication, encrypting and backing up data, using Drexel‑approved security tools, and reporting suspicious activity.
- Knowledge Base
- Security and Access
- Security Consulting and Education
This article summarizes key security risks associated with SaaS applications and provides best practices to mitigate them. Topics include provider vetting, MFA, least‑privilege access, encryption, monitoring, and user education to help protect Drexel data.